Sciweavers

1792 search results - page 345 / 359
» Requirements Capture with RCAT
Sort
View
SIGCOMM
2010
ACM
13 years 10 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
AES
2008
Springer
182views Cryptology» more  AES 2008»
13 years 10 months ago
Logical product models for automated scripting of process-level construction animations
Animation can add significant value to Discrete-Event Simulation by helping verify, validate, and accredit simulation analyses. This is particularly true in construction where typ...
Vineet R. Kamat
BMCBI
2008
155views more  BMCBI 2008»
13 years 10 months ago
Prediction of regulatory elements in mammalian genomes using chromatin signatures
Background: Recent genomic scale survey of epigenetic states in the mammalian genomes has shown that promoters and enhancers are correlated with distinct chromatin signatures, pro...
Kyoung-Jae Won, Iouri Chepelev, Bing Ren, Wei Wang
BMCBI
2008
109views more  BMCBI 2008»
13 years 10 months ago
MetaFIND: A feature analysis tool for metabolomics data
Background: Metabolomics, or metabonomics, refers to the quantitative analysis of all metabolites present within a biological sample and is generally carried out using NMR spectro...
Kenneth Bryan, Lorraine Brennan, Padraig Cunningha...
BMCBI
2010
117views more  BMCBI 2010»
13 years 10 months ago
MetAssimulo: Simulation of Realistic NMR Metabolic Profiles
Background: Probing the complex fusion of genetic and environmental interactions, metabolic profiling (or metabolomics/metabonomics), the study of small molecules involved in meta...
Harriet J. Muncey, Rebecca Jones, Maria De Iorio, ...